Image by Yogysic, Getty Images.

Published: October 18th, 2019


Password lessons: Longer is better, so is salt

Infosec pros who had no idea of how easily a stolen list of hashed passwords could be cracked got a...

October 18th, 2019 Howard Solomon

SecTor 2019: The past, present, and future of malware

The Creeper Worm, the first known computer virus, was designed in 1971 by Robert H. Thomas. It doesn't have the...

October 11th, 2019 Buckley Smith

SecTor 2019: How to survive a ransomware attack

Ransomware is nothing new, although it remains a popular cyber attack that continues to deliver devastating results, according to cybersecurity...

October 9th, 2019 Buckley Smith

SecTor 2018: Four identity management trends to prepare for

Cyber security conferences usually have many predictable sessions, along the lines of ‘Here’s how this foolish company let itself be...

October 19th, 2018 Howard Solomon

SecTor 2018: How to help developers write secure code

There are many people in this world who sometimes don’t like each other: Leaf and Canadiens’ fans, the Hatfields and...

October 5th, 2018 Howard Solomon

SecTor 2018: Security industry is ‘squandering opportunity’

The cyber security industry is squandering the opportunity to make computing safer in an era of an increasing number of...

October 4th, 2018 Howard Solomon

SecTor 2018: Why the cloud means new ways of thinking about security

More organizations are moving to the cloud to host and deliver applications every year as the newness of Internet-based platforms...

October 4th, 2018 Howard Solomon

SecTor 2018: Make better use of logs to improve security, staff satisfaction

The “secret ingredient” to improving enterprise security is right under your nose: Making better use of the logs that hardware...

October 3rd, 2018 Howard Solomon

Tips for tuning a SIEM

Drowning in logs from firewalls, Windows, network switches, Wi-Fi routers and the like? System information and event management (SIEM) suites...

November 21st, 2017 Howard Solomon